O'Reilly logo

Incident Response & Computer Forensics, 2nd Ed. by Chris Prosise, Kevin Mandia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 16
Investigating Routers
 
Routers play many different roles during incidents. They can be targets of attack, stepping-stones for attackers, or tools for use by investigators. They can provide valuable information and evidence that allow investigators to resolve complex network incidents.
Routers lack the data storage and functionality of many of the other technologies we have examined in previous chapters, and thus they are less likely to be the ultimate target of attacks. (One notable exception is that routers are targets during denial-of-service attacks, which we will examine closely.) Routers are more likely to be springboards for attackers during network penetrations. The information stored on routers—passwords, routing tables, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required